This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]

This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.

This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.

This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.

This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.

(Repost) NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.

This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.

A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.

This NSA document from 10 September 2010 details operations against foreign embassies, concluding with a glossary of tools and tactics. Earlier versions of this docoument that only contained some of the operations conducted were published in l’Espresso on 5 December 2013 and in Le Monde on 21 October 2013: see the book No Place to […]

﻿Page 145
10 Sep 2010
CLOSE ACCESS SIGADS
CLOSE ACCESS SIGADS
All Close Access domestic collection uses the US-3136 SIGAD with a unique
two-letter suffix for each target location and m...

The PATENTHAMMER system was developed for SOCOM for advanced signal collection with remote, reach-back capability and deployed to Kosovo, Georgia, Afghanistan, Saudi Arabia, Bahrain, and the Philippines.

This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.

This NSA Staff Processing form from 6 September 2006 describes some of the problems relating to the expansion of the raw FISA information made available to NSA field offices. Referring to different classes of FISA information being stored together the memo concludes that “it is possible that there are already FISA violations resulting from the […]

This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.

This update from the NSANet intranet shows that the International Security Issues section of the agency shows a growing emphasis on gathering economic and financial information on the 13 countries under its remit: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.

This undated presentation from the NSA’s Special Source Operations division shows that the agency’s ability to intercept key communications infrastructure is dependent on corporate relationships, several of which can be identified using information given in this document: see the Guardian article Snowden document reveals key role of companies in NSA data collection, 1 November 2013. […]

NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.

This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.

﻿(S//SI//REL) Finding Nuggets -- Quickly — in a Heap of Voice Collection, From Mexico to
Afghanistan
FROM: (U//FOUO)^^^^^^|
Senior Technical Development Program — Class of 2010, and Intell...

This 6 September 2006 post from the NSA internal newsletter SIDToday describes the role of a Remote Operations Center: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.

This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.

﻿TOP S E C R E T/HVCCO
1. (S) preamblei in 1968 President Johnson and Prime Minister
Eshkol agreed that an intelligence exchange would take place
between the United States and Israel. This und...